which of the following is true of telework Identify the job design method implemented at Tech-Marketing. Golden affirms that coworking spaces may alleviate social isolation, but its unclear whether they address the professional isolation that out-of-office employees tend to experience, he says. Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do? What type of attack might this be? 2003-2023 Chegg Inc. All rights reserved. Which of the following is NOT a best practice to protect data on your mobile computing device? Despite the largely positive findings on the benefits of telecommuting, just 7% of American companies offer the option to most or all of their employees, according to recent BLS data. . jobs. The email has an attachment whose name contains the word "secret". -Request the user's full name and phone number. Remote work (or working remotely) is often considered to be an arrangement where employers require workers to work somewhere other than at the designated worksite because of temporary unforeseeable circumstances, such as pandemics, states of emergency, or inclement weather. They support the strategy of corporate social responsibility by reducing an employee's need to commute using a vehicle. But if everybody is getting it, people may value it less, Gajendran says. Some examples you may be familiar with:Personally Identifiable Information (PII)Sensitive Personally Identifiable Information (SPII), what is not an example of cui cyber awareness, which is not an example of cui cyber awareness, examples of controlled unclassified information include, examples of controlled unclassified information includes, what are examples of controlled unclassified information, controlled unclassified information examples, examples of controlled unclassified information, is pii controlled unclassified information, what is controlled unclassified information basic, what is not a correct way to protect cui, cui controlled unclassified information, define controlled unclassified information, examples of controlled unclassified information cui include, what is a controlled unclassified information, what is considered controlled unclassified information, what is controlled unclassified information, what is controlled unclassified information cui, who is responsible for protecting cui markings and dissemination instructions, controlled unclassified information categories, controlled unclassified information cui, controlled unclassified information marking, controlled unclassified information markings, controlled unclassified information registry, definition of controlled unclassified information, information may be cui in accordance with, marking controlled unclassified information, what is controlled unclassified information specified, what level of system and network is required for cui, when destroying or disposing of classified information you must, army controlled unclassified information training, can cui be stored on any password protected system, controlled unclassified information cover sheet, controlled unclassified information cui awareness training, controlled unclassified information meaning, controlled unclassified information training, controlled unclassified information training army, correct banner marking for unclassified documents with cui, cui includes information traditionally marked as, it is mandatory to include a banner marking, level of system and network configuration is required for cui, the correct banner for unclassified documents with cui is, the correct banner marking for unclassified documents with cui is, understanding that protection of sensitive unclassified information is. Reducing the physical strain on employees performing the job. An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? Helen is utilizing a flexible work schedule option known as _____. P2P (Peer-to-Peer) software can do the following except: -Allow attackers physical access to network assets. What information should you avoid posting on social networking sites? You must have permission from your organization How should you protect a printed classified document when it is not in use? In an ongoing effort known as the University of Michigan Coworking Project, a team of researchers has used surveys, interviews and participatory observations to show that such spaces can create a sense of community without threatening remote workers prized autonomy (Garrett, L.E., et al., Organization Studies, Vol. *SOCIAL ENGINEERING*How can you protect yourself from social engineering? Which of the following best describes the sources that contribute to your online identity? Job descriptions generally contain all of the following components EXCEPT _____. A. A telework arrangement is generally difficult to set up for _____. Some employees work from home a few days a month, some a few days a week and some full timeand the extent of a workers telecommuting can dictate his or her experience. The Act mandates that each teleworker and his/her manager must enter into a written agreement for every type of telework, whether the employee teleworks regularly or not. It is permissible to release unclassified information to the public prior to being cleared. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Investigate the links actual destination using the preview feature. -is only allowed if the organization permits it. A work option in which two part-time employees carry out the tasks associated with a single job. Which of the following is true of telework? *IDENTITY MANAGEMENT*Which of the following is an example of a strong password? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U.S. foreign policy, and recently had his car repossessed. Employees should familiarize themselves with their agency's policy and any relevant procedures and collective bargaining agreements to ensure they are in compliance with their requirements. results in abstract reports that are of limited use. **Classified DataWhich of the following can an unauthorized disclosure of information classified as Confidential reasonably be expected to cause? The parameters of this agreement are most often laid out by the agency policy and/or collective bargaining agreement but should include the following key elements: The manager and teleworker should work together to periodically evaluate the arrangement, make changes to the agreement as necessary, and re-sign the document. Researchers already know a lot about how to coordinate behavior and motivate people working in face-to-face teams, says Kozlowski. What should you do? reducing the information-processing requirements of a job. Which type of information includes personal, payroll, medical, and operational information? Which of the following job design techniques involving the addition of decision-making authorities to a job is credited to Frederick Herzberg? Current success factors of telework ascertained from the 1970's until the late 1990's are reported next. It is a worldwide federation of national standards bodies from 161 countries The OLPC XO-4 runs a Windows-based operating system FALSE A successful defense against a product liability case is typically expensive in terms of legal fees TRUE It can offer freedom from office distractions, reduce work-life stress, and provide an alternative workplace arrangement in case of emergencies. Which of the following is NOT a home security best practice? After you have returned home following the vacation. What should the owner of this printed SCI do differently? If you are using assistive technology to view web content, please ensure your settings allow for the page content to update after initial load (this is sometimes called "forms mode"). Which of the following is true about telework? For more information, review the Security & IT Guidance. Which of the following is a best practice for handling cookies? In the Job Characteristics Model, task identity is defined as the _____. Which of the following is NOT a good way to protect your identity? Decline So That You Maintain Physical Control of Your Government-Issued Laptop. A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. streamlining jobs to make them simpler, efficient, and automatic. Job enrichment differs from job rotation in that job enrichment: empowers workers by adding more decision-making authority to their jobs. **Insider ThreatWhich of the following is NOT considered a potential insider threat indicator? In todays global economy, virtual teams can be distributed across different offices or departments in a single organization or they can span time zones, industries and national borders. Store it in a shielded sleeve to avoid chip cloning. In a remote work situation, managers must rely more heavily on results. If aggregated, the information could become classified. Which of the following does NOT constitute spillage? Employers can hire geographically distributed talent and reduce overhead expenses, while employees can gain flexibility, save time, and reduce transportation and some child-care costs. What are some of the potential advantages and disadvantages? The flexibility, balanced work-home life and other benefits of telecommuting ultimately work to improve employee morale. There are many travel tips for mobile computing. Which of the following is an example of a strong password? What certificates are contained on the DoD Public Key Infrastructure (PKI) implemented by the Common Access Card (CAC)/Personal Identity Verification (PIV) card? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Greater physical distances can present logistical concerns when tasks require real-time communicationfor instance, during a military operation. Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed. TMOs will often work with a Telework Coordinator on the day-to-day operational aspects of telework. -Linda encrypts all of the sensitive data on her government-issued mobile devices. Carla Warne is an HR executive looking for a new job. -As a best practice, labeling all classified removable media and considering all unlabeled removable media as unclassified. 1, 2019). -You must have your organization's permission to telework. Neither confirm or deny the information is classified. What is telework? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. A. *INSIDER THREAT*What threat do insiders with authorized access to information or information systems pose? The Telework Enhancement Act defines telework or teleworking as a work flexibility arrangement under which an employee performs the duties and responsibilities of such employee's position, and other authorized activities, from an approved worksite other than the location from which the employee would otherwise work. You are leaving the building where you work. How should you securely transport company information on a removable media? **Insider ThreatWhat type of activity or behavior should be reported as a potential insider threat? b. National Archives & Records Administration, Sufficient portable work for the amount of telework proposed, Comfort with the technologies, if any, that will be needed to telework, Good communication with your manager, co-workers, customers that will enable a relatively seamless transition from onsite to offsite, Telework office space that is conducive to getting the work done, Dependent care (i.e., child care, elder care, or care of any other dependent adults) arrangements in place, Ability to be flexible about the telework arrangement to respond to the needs of the manager, the workgroup, and the work, Ability to work with minimal direct supervision, Location of the telework office (e.g., home or another alternative workplace), Equipment inventory (e.g., what the employee is supplying, what the agency is providing, and who is responsible to maintain it), A general overview of the type of work that will be performed while teleworking, Telework contact information (e.g., what phone number to use on the telework day). The Act requires employees to successfully complete telework training before they can telework. Label all files, removable media, and subject headers with appropriate classification markings. As part of the telework arrangement, be clear about when teleworkers are expected to be completing tasks and when they should be responsive to incoming calls or emails. What type of security is "part of your responsibility" and "placed above all else?". Under DLA policy, a first-line supervisor may be delegated authority to: Approved telework requests. CUI may be stored on any password-protected system. "Telework is a work arrangement that allows an employee to perform work during any part of regular, paid hours, at an approved alternative worksite (e.g., home or telework center). Discuss the difference. Jacoby, K.S., & Holland, S., In The Bridge: Connecting Science and Practice Society for Industrial and Organizational Psychology, Jan. 4, 2019, SIOP White Paper Series: Telecommuting B. PAQ reports provide concrete recommendations useful for writing job descriptions or redesigning jobs. **Insider ThreatHow many potential insider threat indicators does a coworker who often makes others uneasy by being persistent in trying to obtain information about classified projects to which he has no access, is boisterous about his wife putting them in credit card debt, and often complains about anxiety and exhaustion display? In these cases, leadership functions need to be shifted to the team itself, so members with specific expertise can drive problem-solving in various areas.. What is considered a mobile computing device and therefore shouldn't be plugged in to your Government computer? Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. -TRUE The use of webmail is -is only allowed if the organization permits it Using webmail may bypass built in security features. Other researchers have found that formalizing a virtual teams goals, roles and communication methods at the outset improves effectiveness (Gibson, C.B., et al., Journal of International Business Studies, Vol. -Unclassified information cleared for public release. Also, information technology security training is mandatory at the agency level, and teleworkers must complete this training and understand their responsibilities in safeguarding work-related information. a. Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. You are reviewing your employees annual self evaluation. What does Personally Identifiable Information (PII) include? Which of the following job design techniques does Carl implement in his store? What should you do if a reporter asks you about potentially classified information on the web? -Ask them to verify their name and office number. A good telework arrangement starts with a good self-assessment. View more. He lets the staff decide whether to issue refunds or replace merchandise in case of consumer grievances. Which is a way to protect against phishing attacks? Which of the following is an important managing-by-results guideline to implement Praise in public, criticize in private Developing a structured work plan includes All of the above All of the following are important pieces of a communication plan EXCEPT Of-site meetings that a teleworker would attend in person All of the following are reminders about telework agreements EXCEPT Should not be . *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? Which of the following is NOT Protected Health Information (PHI)? Additionally, employees are required to comply with their agencys information security policies, participate in information security training, follow security protocols for remote connectivity, and maintain security of any relevant materials, including files, correspondence, and equipment. On the public health side, an estimated 50 million people with telework-compatible positions would prevent 95,000 traffic-related injuries and deaths per year and save more than $11 billion. Which of the following is true about telework? Which of the following is true about telework? Classified material must be appropriately marked. the details of pay and benefits attached to the job. Company leaders hesitation around flexible work arrangements is often driven by the fear that performance will suffer if employees arent closely monitored. Retrieve classified documents promptly from printers. **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. What should be your response? You are logged on to your unclassified computer and just received an encrypted email from a co-worker. And because teleworkers cant make social connections during watercooler chats, Jacoby also suggests alternative ways to support staff relationship-building, including online message boards and small stipends for virtual lunch or coffee dates. *Spillage.What should you do if a reporter asks you about potentially classified information on the web? -Connect to the Government Virtual Private Network (VPN).?? You check your bank statement and see several debits you did not authorize. Which of the following is NOT true concerning a computer labeled SECRET? When teleworking, you should always use authorized and software. A) The U.S. workforce is becoming older, and younger workers are more educated B) The U.S. workforce is becoming younger, and younger workers are more educated C) The U.S. workforce is becoming younger, and older workers are more educated A pop-up window that flashes and warns that your computer is infected with a virus. Phishing can be an email with a hyperlink as bait. -Remove and take it with you whenever you leave your workstation. **TravelWhat is a best practice while traveling with mobile computing devices? You will get the details of all company-provided materials room & # x27 ; s cables nearest Canada Personnel management offers online telework training before they can telework shows the technical requirements - Oracle /a >. Which of the following represents a good physical security practice? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Those workers tend to be older, more educated, full time and nonunion. 1, 2010). A coworker has asked if you want to download a programmer's game to play at work. It displays a label showing maximum classification, date of creation, point of contact, and Change Management 9CM) Control Number. 4, 2014). 0 votes . *PHYSICAL SECURITY*At which Cyberspace Protection Condition (CPCON) is the priority focus on critical and essential functions? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). Coworker making consistent statements indicative of hostility or anger toward the United States in its policies. Which of the following should be reported as a potential security incident? What should you do? Telecommuting is a management tool just like any other, Gajendran says. Which of these is true of unclassified data? Teams with a strong group identityfor instance, those that have unified against a competing team or organizationtend to have more perceived proximity, Wilson says. D. Which of the following is true about telework? When is it appropriate to have your security badge visible? asked May 31, 2022 in Other by Kamal (64.9k points) Which of the following is true about telework? Follow instructions given only by verified personnel. -Setting weekly time for virus scan when you are not on the computer and it is powered off. Which of the following is NOT an example of CUI? Which of the following is true about telework? Classified material must be appropriately marked. Telecommuting supports the strategy of corporate social responsibility by reducing the employee's need to commute by vehicles. Which of the following is NOT a way that malicious code spreads? Which of the following is NOT an appropriate way to protect against inadvertent spillage? How many potential insider threat indicators does this employee display? When vacation is over, after you have returned home. How many indicators does this employee display? SSN, date and place of birth, mothers maiden name, biometric records, PHI, passport number, Subset of PII, health information that identifies the individual, relates to physical or mental health of an individual, provision of health care to an individual, or payment of healthcare for individual. Which method would be the BEST way to send this information? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? Which of the following is a practice that helps to protect you from identity theft? What information most likely presents a security risk on your personal social networking profile? You can find your Telework Coordinator by searching OPM's Telework Contact Tool. Report the crime to local law enforcement. degree to which a job requires completing a whole piece of work from beginning to end. A coworker brings a personal electronic device into prohibited areas. When its done right, telework can improve employee productivity, creativity and morale, psychologists research finds. CUI may be stored on any password-protected system. Which of the following best describes job sharing? No. (2019, October 1). In the teleworking sphere, psychologists are confident about a continuing upward trendBell anticipates such growth as businesses aim to attract employees in a tight labor market and as communication technologies become more sophisticatedbut theyre still probing a number of unanswered questions. Which of the following is NOT a typical result from running malicious code? 2, 2017) and other dimensions of the remote work arrangement. **Home Computer SecurityHow can you protect your information when using wireless technology? Compute the balances in both accounts after 101010 and 303030 years. When checking in at the airline counter for a business trip, you are asked if you would like to check your laptop bag. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? They are the most difficult to implement for people in managerial or professional jobs. Immediately notify your security point of contact. They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Which of the following is true of protecting classified data? For some, operating from a co-working spacea shared office that provides telecommuters and freelancers with internet access, meeting rooms and other amenitiescan help address social isolation. Cyber Awareness Challenge Complete Questions and Answers. In which situation below are you permitted to use your PKI token? * CLASSIFIED DATA*Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization? How many potential insider threat indicators does this employee display? A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. What is the best response if you find classified government data on the internet? Which of the following statements is TRUE about the use of DoD Public Key Infrastructure (PKI) tokens? 3, 2017). How many potential insiders threat indicators does this employee display? It can be most beneficial to simplify jobs where _____. Step 13: Participate in telework and lead by example Managers and supervisors must be committed to using telework to the fullest extent possible if Federal telework programs are to be successful. According to Herzbergs two-factor theory, which of the following factors would motivate individuals the most? c. Interpret the results in (a) and (b). Employees should consider the following factors in making an honest determination about their telework capabilities: Additionally, to be a successful teleworker you need to have work habits that support independent task performance. Which of the following is NOT an appropriate way to protect against inadvertent spillage? When using your government-issued laptop in public environments, with which of the following should you be concerned? Your health insurance explanation of benefits (EOB). How can you protect your information when using wireless technology? Gajendran and his colleagues found that teleworkers often go above and beyondfor instance, by responding to emails outside of work hoursto demonstrate their organizational commitment (Personnel Psychology, Vol. You receive a call on your work phone and you're asked to participate in a phone survey. For analyzing technical skill levels, the best source for job information may be ____, who have vast experience rating a wide range of jobs. Which of the following demonstrates proper protection of mobile devices? A smartphone that transmits credit card payment information when held in proximity to a credit card reader. The Act requires the successful completion of "an interactive telework training program" for employees prior to entering into a written telework agreement. Which is a risk associated with removable media? d. All of the above are steps in the measurement process of external . All of the Partnership's employees have access and are welcome to enjoy the following: . As part of the survey the caller asks for birth date and address. question. 42, No. (32)2. As a security best practice, what should you do before exiting? Should you always label your removable media? -Look for a digital signature on the email. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Use TinyURLs preview feature to investigate where the link leads. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET. Which of the following is true about telework? You have reached the office door to exit your controlled area. *MALICIOUS CODE*Which of the following is NOT a way malicious code spreads?